From the course: Cybersecurity Fundamentals for IT Technicians by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Social engineering, impersonation techniques, and avoidance

Social engineering, impersonation techniques, and avoidance

From the course: Cybersecurity Fundamentals for IT Technicians by Pearson

Social engineering, impersonation techniques, and avoidance

In this lesson, we're going to talk about some pretty scary things. We're going to talk about social engineering, impersonation, and how do we avoid all of these things. So, let's get in. Tailgating. One of the most common ways of squirming your way into somebody's environment. Hey, I forgot my badge. Can you hold the door? Oh, sure. And then, poof, thank you so much. Oh, what a crazy day. I forgot my badge at home. Oh, no worries. All right. Well, have a good day. You too. Poof. And now that person's inside. Because just pretending that you have a badge and acting like you belong there oftentimes is believable enough for somebody to let you into that environment. Somebody could walk up, steal laptops, walk up, steal free coffee, whatever. They might run in and do some other nefarious things that might be even more dangerous. if you're a school or something to that effect. Keep that in mind. You're going to need to look for these things. The other thing is pretending to be another…

Contents